Data sources encountered during my SecOps career

During my SecOps career I monitored event logs from multiple vendors. Below are concise notes on a few common sources I worked with.

Primary vendors & systems

  • Microsoft Windows Server

    Windows Event Logs, Sysmon and Defender alerts — essential for endpoint and identity signals.

  • F5 BIG-IP WAF

    HTTP access and WAF event logs — used to detect web application attacks and anomalous requests.

  • Okta (System / Audit Logs)

    Authentication, MFA and admin events — critical identity and access telemetry.

  • Trend Micro (EDR)

    Endpoint telemetry and EDR alerts — process, file and network events useful for detection and response.

  • Microsoft Defender (EDR)

    Endpoint detection and response telemetry — alerts and process/file/network signals for detection and containment.

  • FortiGate (Firewall)

    Firewall and traffic logs via syslog — network flows, blocked connections and VPN events for perimeter and network-level visibility.

  • Forcepoint Proxy

    Proxy logs and URL filtering events — visibility into web access, blocked sites and potential data exfiltration via web channels.

  • Zscaler Internet Access (Proxy)

    Cloud proxy and URL filtering logs — internet traffic, policy enforcement and TLS inspection events for web gateway visibility.

  • Zscaler Private Access (VPN)

    Tunneled application access and session logs — user-to-app connection events and access decisions for secure private access visibility.

  • Office365 / Microsoft 365 (Audit Logs)

    Exchange, SharePoint, Teams and Azure AD audit events — user and admin activity, file access and mailbox events for collaboration and identity visibility.

General guidance

  • Use reliable collection (agents, syslog, API) with secure transport.
  • Normalize timestamps and key fields for cross-source correlation.
  • Enrich logs with asset and identity context to reduce false positives.
  • Keep parsing rules simple and test detections with representative traffic.

Why this matters

Combining endpoint, identity and application-layer telemetry gives broader visibility and enables higher‑fidelity detections.

I can produce short checklists or SIEM parser templates for these sources on request.